Sciweavers

2740 search results - page 191 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
174
Voted
EVOW
2010
Springer
15 years 10 months ago
Towards Automatic Detecting of Overlapping Genes - Clustered BLAST Analysis of Viral Genomes
Overlapping genes (encoded on the same DNA strand but in different frames) are thought to be rare and, therefore, were largely neglected in the past. In a test set of 800 viruses ...
Klaus Neuhaus, Daniela Oelke, David Fürst, Si...
145
Voted
KBSE
2009
IEEE
15 years 10 months ago
Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients
Methods in object-oriented concurrent libraries hide internal synchronization details. However, information hiding may result in clients causing thread safety violations by invoki...
Jyotirmoy V. Deshmukh, E. Allen Emerson, Sriram Sa...
ASPDAC
2009
ACM
143views Hardware» more  ASPDAC 2009»
15 years 10 months ago
Statistical modeling and analysis of chip-level leakage power by spectral stochastic method
In this paper, we present a novel statistical full-chip leakage power analysis method. The new method can provide a general framework to derive the full-chip leakage current or po...
Ruijing Shen, Ning Mi, Sheldon X.-D. Tan, Yici Cai...
123
Voted
VTC
2008
IEEE
113views Communications» more  VTC 2008»
15 years 10 months ago
Coverage Performance Analysis of Multiuser MIMO Broadcast Systems
— We consider the downlink of a multiuser multi-input multi-output (MIMO) broadcast channel under a single cell structure. To study the achievable link coverage performance of ze...
Li-Chun Wang, Chu-Jung Yeh, Chi-Fang Li
ACSAC
2007
IEEE
15 years 9 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz